Brennan
04
Jun
2025

Cloud Covered 2025: Cloud Management

Browse by Chapters Click on the tiles below to navigate the practical realities of the cloud ecosystem.  Cloud Covered Champion…

Custom Active Directory Extensions Create Stealthy Backdoors for Corporate Attacks
04
Jun
2025

Custom Active Directory Extensions Create Stealthy Backdoors for Corporate Attacks

Active Directory (AD) Group Policy Objects (GPOs) are a cornerstone of centralized management for Windows environments, enabling administrators to configure…

Brennan
04
Jun
2025

Cloud Covered 2025: Cloud Engineering & Architecture

Browse by Chapters Click on the tiles below to navigate the practical realities of the cloud ecosystem.  Cloud Covered Champion…

DollyWay World Domination Attack Compromises 20,000+ Sites
04
Jun
2025

DollyWay World Domination Attack Compromises 20,000+ Sites

Since 2016, the “DollyWay World Domination” campaign has quietly compromised more than 20,000 WordPress websites worldwide, exploiting vulnerabilities in plugins…

How to manage your cyber risk in a modern attack surface
04
Jun
2025

How to manage your cyber risk in a modern attack surface

According to research, 62% of organizations said their attack surface grew over the past year. It’s no coincidence that 76%…

Rethinking governance in a decentralized identity world
04
Jun
2025

Rethinking governance in a decentralized identity world

Decentralized identity (DID) is gaining traction, and for CISOs, it’s becoming a part of long-term planning around data protection, privacy,…

HPE Issues Security Patch
04
Jun
2025

HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass

Jun 04, 2025The Hacker NewsVulnerability / DevOps Hewlett Packard Enterprise (HPE) has released security updates to address as many as…

Agentic AI and the risks of unpredictable autonomy
04
Jun
2025

Agentic AI and the risks of unpredictable autonomy

In this Help Net Security interview, Thomas Squeo, CTO for the Americas at Thoughtworks, discusses why traditional security architectures often…

Trustifi Raises $25 Million for AI-Powered Email Security
04
Jun
2025

Trustifi Raises $25 Million for AI-Powered Email Security

Email security startup Trustifi on Tuesday announced raising $25 million in a Series A funding round led by Camber Partners,…

CISOs need better tools to turn risk into action
04
Jun
2025

CISOs need better tools to turn risk into action

Many organizations are overwhelmed by the complexity of their IT systems, making it difficult to manage cybersecurity risks, according to…

Victoria Police refreshes online reporting
04
Jun
2025

Victoria Police refreshes online reporting

Victoria Police has upgraded its online reporting function for non-emergency crimes as its seven-year contract with provider Serco reaches expiry….

New Research Reveals Strengths and Gaps in Cloud-Based LLM Guardrails
04
Jun
2025

New Research Reveals Strengths and Gaps in Cloud-Based LLM Guardrails

A comprehensive new study has exposed significant vulnerabilities and inconsistencies in the security mechanisms protecting major cloud-based large language model…